Search results for "secure communication"
showing 10 items of 11 documents
An asynchronous covert channel using spam
2012
AbstractCurrent Internet e-mail facilities are built onto the foundation of standard rules and protocols, which usually allow a considerable amount of “freedom” to their designers. Each of these standards has been defined based on a number of vendor specific implementations, in order to provide common inter-working procedures for cross-vendor communication. Thus, a lot of optional and redundant information is being exchanged during e-mail sessions, which is available to implement versatile covert channel mechanisms.This work exploits this possibility by presenting a simple but effective steganographic scheme that can be used to deploy robust secret communication through spam e-mails. This s…
Cyber Security for Wireless Semantic (SCADA/DCS) Systems
2016
International audience; Supervisory Control and Data Acquisition and Distributed Control Systems named (SCADA/DCS) have played a key role in the design of modern power smart applications, particularly in the automatic management of real time energetic platforms. In this work, we present a semantic cyber security vulnerabilities add to classic one, with the use of semantic embedded application in smart devices in semantic wireless (SCADA/DCS) systems, focusing on the semantic attacks. In this work, we present a new security semantic wireless protocol as a secure communication support for these modern semantic wireless systems named (ZIGBEE/SOAP/SECURITY), obtained by the combination between …
Integration of IEC 61850 MMS and IEEE 802.22 for Smart Grid Communication
2017
The reliability of Smart Grid depends on two-way communication between substation and utility. IEC 61850 is an international standard defined to ensure interoperability between Substation Automation System (SAS). IEC 61850 services are mapped on the Manufacturing Message Specification (MMS) especially for meter data management system. MMS is the OSI protocol that run over TCP/IP or OSI networks to support IEC 61850 services. Presently, the MMS uses Ethernet as the layer 2 protocol. However, for long distance communication in remote areas wireless communication is the prefered mode. The Cognitive Radio based IEEE 802.22 is next generation standard for Wireless Regional Area Network (WRAN) th…
Chaos Synchronization Based on Unknown Input Proportional Multiple-Integral Fuzzy Observer
2013
Published version of an article in the journal: Abstract and Applied Analysis. Also available from the publisher at: http://dx.doi.org/10.1155/2013/670878 Open Access This paper presents an unknown input Proportional Multiple-Integral Observer (PIO) for synchronization of chaotic systems based on Takagi-Sugeno (TS) fuzzy chaotic models subject to unmeasurable decision variables and unknown input. In a secure communication configuration, this unknown input is regarded as a message encoded in the chaotic system and recovered by the proposed PIO. Both states and outputs of the fuzzy chaotic models are subject to polynomial unknown input with kth derivative zero. Using Lyapunov stability theory…
Energy efficient resource allocation for secure OFDMA relay systems with eavesdropper
2016
In this paper, we address the energy efficient resource allocation problem for a secure orthogonal frequency division multiple access (OFDMA) relay system. In particular, we consider there is a eavesdropper near the base station (BS) which tries to overtake the information sent by BS. We formulate the joint optimization problem with the objective to optimize the energy efficiency of the considered system by considering subcarrier pairing, secret data rate and power allocation. In addition, the system can assign different priority to different users such that the security of information transmission can be guaranteed. The proposed iterative algorithm not only maximizes the system energy effi…
New adaptive synchronization algorithm for a general class of complex hyperchaotic systems with unknown parameters and its application to secure comm…
2022
Abstract The aim of this report is to investigate an adaptive synchronization (AS) for the general class of complex hyperchaotic models with unknown parameters and a new algorithm to achieve this type of synchronization is proposed. Owing to the intricacy behavior of hyperchaotic models that could be effective in secure communications, the special control based on adaptive laws of parameters is constructed analytically, and the corresponding simulated results are performed to validate the algorithm’s accuracy. The complex Rabinovich model is utilized as an enticing example to examine the proposed synchronization technique. A strategy for secure communication improving the overall cryptosyst…
How to prevent cyber-attacks in inter-vehicle communication network?
2015
In this work, we aim to secure communication in a vehicular network by providing a proactive mechanism that can detect and predict with a high accuracy the future behavior of malicious attacker. In fact, the mechanisms proposed in the literature consider only detection mechanisms and do not prevent attacks that may arise in the network. Simulation results show that our mechanism has a high detection rate, low false positive rate while generating a low communication overhead.
FoSBaS: A bi-directional secrecy and collusion resilience key management scheme for BANs
2012
Body Area Network (BAN) consists of various types of small physiological sensors, transmission modules and low computational components and can thus form an E-health solution for continuous all-day and any-place health monitoring. To protect confidentiality of collected data, a shared group key is usually deployed in a BAN, and consequently a secure communication group is generated. In this paper, we propose a bi-directional security and collusion resilience key management scheme for BAN, referred to as FoSBaS. Detailed analysis shows that the scheme can provide both forward security and backward security and resist against collusion attacks. Furthermore, the FoSBaS is implemented on a Sun …
Expectations and Experiences of Implementing a Mobile Secure Communication Application
2020
The privacy and security of communication in corporations and governmental organizations has increased enormously over the years. At the same time, a growing amount of technological solutions to support this have emerged. This study examines user expectations before and use experiences during the implementation phase of a mobile secure communication application. These are investigated from the expectation–confirmation perspective and its influence on continued adoption. The study has an exploratory approach for this investigation. To guide the investigation, the study draws from the expectation–confirmation theory (ECT) and the unified theory of acceptance and use of technology (UTAUT). Emp…
Synchronization of hidden chaotic attractors on the example of radiophysical oscillators
2017
In the present paper we consider the problem of synchronization of hidden and self-excited attractors in the context of application to a system of secure communication. The system of two coupled Chua models was studied. Complete synchronization was observed as for self-excited, as hidden attractors. Beside it for hidden attractors some special type of dynamic was revealed.